|Publication number||US6654789 B1|
|Application number||US 10/030,849|
|Publication date||Nov 25, 2003|
|Filing date||Jul 20, 2000|
|Priority date||Jul 20, 1999|
|Also published as||WO2001006497A2, WO2001006497A3|
|Publication number||030849, 10030849, PCT/2000/19801, PCT/US/0/019801, PCT/US/0/19801, PCT/US/2000/019801, PCT/US/2000/19801, PCT/US0/019801, PCT/US0/19801, PCT/US0019801, PCT/US019801, PCT/US2000/019801, PCT/US2000/19801, PCT/US2000019801, PCT/US200019801, US 6654789 B1, US 6654789B1, US-B1-6654789, US6654789 B1, US6654789B1|
|Inventors||Austin C. Bliss, Robert W. Mack, William B. Kaplan, Mark Rosenstein|
|Original Assignee||Freshaddress, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (6), Referenced by (65), Classifications (11), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application claims the benefit of Provisional Application Ser. No. 60/144,687 filed Jul. 20, 1999.
1. Field of the Invention
The present invention relates to a system for storing and retrieving electronic identifiers, and, more particularly, an interactive system for creating and maintaining a searchable database of old and new electronic identifiers, such as e-mail addresses.
2. Background of the Invention
Most Internet users have multiple e-mail addresses (e.g. firstname.lastname@example.org). These electronic addresses are unique ways of reaching an individual, but are not necessarily permanent throughout one's life. Electronic addresses change for many reasons, including when the individual moves, changes employers, or selects a different Internet service provider. Instead of changing or letting an address lapse, some people will maintain multiple addresses. For example, someone may obtain an address through school, add a personal address, and obtain an address from work. Still others maintain multiple Internet service providers to mitigate access problems, and each ISP typically yields at least one e-mail address. The result is that a single individual or entity may accumulate many addresses over time.
When an individual changes his e-mail address, he must notify friends, relatives, and business associates of the new contact information. There are also numerous electronic services and businesses that need updating. Inevitably, not everyone is notified, and those who are not notified are left with an e-mail address that no longer functions or works—a “dead” address. When e-mail is sent to a dead address the sender typically receives a message informing them that the message was undeliverable, but not providing a current e-mail address for the intended recipient. Other old addresses may not be dead, but rather out of favor with its owner such that e-mail should not be sent to that address.
The same problems exist for other electronic based identifiers. For example, such identifiers can include homepages having URLs with a unique second level domain name or a common second level domain name shared by many other individuals and companies through a commercial service such as Geocities. Other identifiers may include chat handles or nicknames within certain Internet service providers such as AOL.
It is an object of the present invention to provide an accessible electronic system for storing old and new electronic identifiers for searching and matching the new and old electronic identifiers of an entity.
It is a further object of the present invention to create a bridge from old to new e-mail addresses.
These and other objects of the present invention are accomplished by having a searchable electronic database of old and new electronic identifiers in which the information in the database is entered and maintained by individual registrants of the system. The searchable database stores both old and new information in association with one another.
These and other objects and features of the present invention will be better understood and appreciated from the following detailed description of one basic embodiment thereof, selected for the purpose of illustration and shown in the accompanying drawings, in which:
FIG. 1 is a flowchart diagram of the registration process of the present invention;
FIG. 2 is a flowchart diagram of the searching process of the present invention;
FIG. 3 is a flowchart diagram of the updating process of the present invention;
FIG. 4 is a flowchart diagram of the confirmation e-mail process of the present invention;
FIG. 5 is a flowchart diagram of the periodic e-mail process of the present invention; and
FIG. 6 is a flowchart diagram of the third-party database refreshing process of the present invention.
The present invention comprises a system which can be deployed as a web site on the Internet, having three primary components: registering (FIG. 1), searching (FIG. 2). and updating (FIG. 3). Through the use of the system, old and new electronic identifiers are interrelated so that a visitor to the system can find the preferred identiying information about a registrant with the system. While the embodiment described herein relates to e-mail addresses, the system could be readily adopted to accommodate other electronic identifiers, such as URLs, ICQ #s, and chat handles.
The registration component of the present invention is best illustrated in FIG. 1. In this process, the registrant enters his old and new e-mail addresses into the system. Variations of the precise process should be obvious to one of skill in the art, and those variations are included within the scope of this invention.
As a first step 10, the “soon to be” registrant must first enter his preferred address followed by a password. The preferred address may not be the only viable address for the registrant, but rather is the e-mail address he prefers others use to contact him. As a validity mechanism, the registrant must accurately retype the selected password. A password hint is also available in the preferred embodiment in case the registrant forgets his password in the future. Preferably, the system also checks to make sure that: the password is not contained within the preferred address; the hint does not contain the password; the password is not easy to guess; and the password contains a specified minimum number of characters. A typical interface is used such as a graphical button so that the registrant may indicate when he has finished entering the required information. Validation steps 15, 20, 25 are then performed to ensure among other things that: the preferred address conforms to the standard e-mail format 15; is unique 20 in comparison to other names in the system; and that the registrant has not already registered that e-mail address 25.
Additional features of the system provide for privacy options (not shown) which are intended to reduced unwanted e-mails, including spamming. For example. registrants would be given the option to have their preferred address returned to a visitor as a graphic. Or, similarly, the system would require answers to specific questions about the registrant which are not intended to trick the visitor, but rather to force the visitor to be responsive which is virtually impossible for a bot that may visit the system to update information about registrant, including an address database of spam or junk e-mail. Also, registrants would be given the option never to have their preferred address released without their explicit authorization. In this event, when a visitor searches for the registrant's preferred address, the system would notify the registrant requesting authorization to release his preferred address.
Additional privacy options would allow registrants to control which visitors the system provided with their preferred addresses. In one embodiment, the system would never return a registrant's preferred address to a list of specified visitors. Alternately, the system would only provide a registrant's preferred address to a list of specified visitors. To determine the contact information of the visitor, the system would require visitors to register before providing search results. Additionally, registrants would be able to specify different privacy options for each address entered during the registration process. Such privacy options would be made available to the visitor through typical graphical and textual interfaces.
Other options also provide that the registrant may include text or graphical messages in response to a visitor. Such messages may include additional information such as that the registrant will be moving on a particular date. The system may also be set up by the registrant to yield particular preferred addresses depending on the date of the search. These features can be combined to include multiple preferred addresses in a list with date and other information for visitors searching the system. These features will be discussed in reference to searching in conjunction with FIG. 2 below.
The next step 30 is an e-mail confirmation that is sent to the registrant using the preferred address. The confirmation e-mail is monitored for a return or bounce-back which would indicate an error with the preferred address. Moreover, the confirmation e-mail also allows the recipient, if not the same as the registrant, to protest the use of the e-mail address within the system. The e-mail confirmation system is more fully described below in conjunction with FIG. 4.
Once the preferred e-mail address has been validated, which may not include waiting for responses to the confirmation e-mail 30, the registrant is requested to enter one or more additional e-mail addresses 35. A typical graphical function is provided to allow each newly entered address to be marked as dead or current. Dead addresses are addresses which are non-functioning, and current addresses are functioning but are not preferred by the registrant to be used for e-mail by visitors to the system. Validation steps 40, 45, 50 are then performed to ensure that all e-mail addresses conform to the standard e-mail format and for other issues as described in conjunction with steps 15, 20, 25 above. After these steps, a confirmation e-mail 55 may be sent to each e-mail address, whether current or dead for the purposes noted above with regard to the confirmation e-mail 30 described in conjunction with the preferred address. This process will be discussed in more detail below.
Once the current and/or dead addresses have been validated, which may or may not include results from the confirmation e-mail step 55, the registrant is queried 60 for e-mail addresses of at least one entity to be contacted in the event that the registrant's entered information becomes outdated. The registrant may also be prompted to enter his own name so that the contact or contacts can receive a notification from the system. A simple validation step 65 is then performed to ensure that all entered contact e-mail addresses conform to the standard e-mail format. Preferably, confirmation e-mails are then sent to the enumerated contacts 70. Here too, the recipient, if so desired, may object to or otherwise modify the contact information received from the system.
Having finished the complete registration process, the registrant is notified that he is registered with a preferred address; that he will receive a confirmation e-mail with information about the registration; and that he should update his registration where necessary.
In another embodiment, the confirmation e-mail steps 30, 55, 70 may be launched near the completion of the registration process. Similarly, validation steps may occur at different times during the process. To maintain data quality, at least the preferred address is periodically sent e-mails by the system. In all cases, bounce-back or protest e-mail responses are monitored, so that the data can be handled as necessary. This is discussed further in conjunction with the periodic e-mail process described with FIG. 5 below.
In the event that one or more of the registrant's addresses are not unique in comparison to other names in the system, the registrant may be prompted to enter additional information to distinguish his address from another registrant's address, or the address may be blocked from registration.
In an additional embodiment, the described registration process will be operated in conjunction with the registration process of other services. For example, the system may coordinate with the signup process used when a customer contracts with a new Internet Service Provider, as that is a likely moment in which a new e-mail address is being issued.
The searching segment of the system provides a visitor the ability to obtain the preferred address of a registrant. While various embodiments are possible, FIG. 2 illustrates a preferred embodiment.
In the first step 75, the visitor is prompted to enter a target e-mail address to be searched. A graphical button is provided so that the visitor may indicate that they are ready for the search to be performed. Once started, a first validation step 80 is then conducted to ensure that the entered information conforms to the standard e-mail format.
The target e-mail address is then compared to all entries in the preferred address database 85. Since four possible search results are possible, three conditions are reviewed, although the order illustrated in FIG. 2 is not important: no match 90; match with a dead address 95; and match with a current address 100. If none of these conditions exist, the input address is the preferred address 105.
In the event of no match, the registrant is notified 110 that there is either a typographical error in the search query 75 or that there is no matching registration.
In the event of any match, whether dead 115, current 120, or preferred 105, the visitor is provided with the preferred address associated with the entered e-mail address, along with a graphical button that operates as the standard “mailto” function for commercial browsers such as those offered by Microsoft and Netscape. This step is delayed if the registrant has invoked privacy features such as requiring the visitor to answer a specific question before the preferred address is provided. Also, if textual or graphical messages have been entered into the system by the registrant, those features are also returned. Also, if the registrant has set up the system to return more than one preferred address, the visitor is provided the option of which address to use if the visitor is going to send an e-mail over the system. Finally, the system may indicate to the visitor the preferred address, the date of registration or last update by the registrant, or other information associated with the registration.
If the preferred address is known by the system to be suspect, such as through a bounce-back to a periodic e-mail, the visitor may also be warned that the preferred address may not be accurate or functioning. In the event that the visitor knows the preferred address to be suspect, such as through a previous bounce-back to an e-mail, a mechanism may be provided for the visitor to self-report the suspect preferred address. In one embodiment, a graphical button will be provided so that the visitor can indicate a suspect preferred address.
The searching of a particular record by a visitor may be stored as statistics for the registrant. The registrant may later visit the system and obtain the information which may include identification of the visitor and the date and time visited.
In the event that the system found no match to the search query, an option would be provided to notify the visitor once the preferred address was known. Such an option would be made available to the visitor through typical graphical and textual interfaces, and would require the visitor to enter appropriate contact information.
As a further feature, if the preferred address is not known by the system, a heuristic table is consulted. This table contains a list of unrecognized queries and the likely corrections. The table is generated by creating a list of common misspellings to commonly used domain names or changes to commonly used domain names. For example, if it is determined that a common misspelling of the domain name freshaddress.com is freshadress.com, then the table will refer to freshaddress.com for all appearances of freshadress.com. Similarly, if the provider of freshaddress.com changes all e-mail addresses to freshaddressinc.com, then the table would match those two addresses. If an entry is found in the table, the visitor is notified of his possible error and the suggested correction. The system may then prompt the visitor to perform a corrected query.
The updating process (FIG. 3) permits a registrant to change any part of his database information. To validate his identity, the registrant is first prompted 125 for his preferred address and password. If a registrant has forgotten his password, an e-mail containing his password is sent to his preferred address. Alternately, the password hint (entered during step 10) is provided, along with a link to customer service in the event that the registrant still cannot match the password.
After validation review of the address 130, and upon a successful match of the information, the registrant is passed through to a secure area of the system 135, where graphical buttons are provided 140 for the following functions: changing the registered preferred address, updating addresses, changing passwords, or updating contacts.
If the registrant wants to change the preferred address, a list of all e-mail addresses in the system for that registrant are presented for modification. In addition, preferably a blank text box is provided for a new address, although other variations of editing are available including having each address placed in a separate text box ready for modification. A graphical element is added to the side of the list that allows the exclusive selection of one of the existing addresses as the new preferred address. The registrant also has the option of entering a completely new preferred address. In such case, the former preferred address becomes a current or dead address pursuant to input from the registrant. A preferred address may only be altered after another address has been selected to replace it as the preferred address. In the event that there is a new preferred address, validation of the modified address for conformity to standard e-mail formatting and uniqueness is undertaken before the registrant's record is updated. When completed, confirmation e-mails 145 are sent in accordance with the procedure outlined above during the registration process.
To update other addresses, the registrant is also presented with a list of all of his registered e-mail addresses, and a graphical button to enter a new address. If the registrant clicks on any existing listed address, the registrant is provided with an “Update Address” text box, in which the address may be edited, and an exclusive list of three options is presented: “current,” “dead,” or “delete address.” If the registrant clicks on the graphical button to enter a new address, the registrant is provided with a “New Address” text box for the registrant to enter the new address, and an exclusive list of two options is presented: “current” or “dead.” The registrant is given the option to accept the changes. If accepted, the new or modified e-mail addresses are validated and confirmation e-mails are sent 145.
When updating the addresses, the registrant is also provided the option to add textual or graphical features for existing or new addresses. In addition, if the registrant desires, some of the privacy features may be implemented to preclude unwanted e-mail. When completed, the registrant also has the option to forward any new preferred address to all contacts or any other list of addresses, including from an address book that the registrant may have running in conjunction with the system.
To change passwords, the registrant is asked to enter his old password, his new password and a new password hint, and the registrant is asked to reenter his new password for confirmation. Processing modifications to these records are similar to step 10 described above.
To change contacts, the registrant is presented with his previously entered contact information including all existing contact e-mail addresses and a graphical button to add new contacts. As the registrant clicks on the item to be changed, text boxes or other known modification interfaces are made available. Upon acceptance by the registrant of the accuracy of the information entered, the information is validated, and confirmation e-mails 145 are sent as discussed above.
Confirmation e-mails, as illustrated in FIG. 4, are sent 30, 55, 70, 145 to every registered preferred, current, dead and contact address, as noted throughout this description, primarily as part of the registration process (FIG. 1) and the updating process (FIG. 3). Each mailing is tracked over a period of time, typically two days, to determine whether a bounce-back message is received 160 indicating that the confirmation was undeliverable. The system recognizes the difference between bounce-back messages and responses, including automatic replies. E-mails sent to current, preferred, and contact e-mail addresses are expected to arrive successfully. E-mails sent to dead addresses are expected to bounce-back. Thus, if an e-mail bounce-back to a preferred, current, or contact address is not received 165, the address is marked accurate 170. For a dead address with no bounce-back, the address is marked as suspect 175 and is subject to further processing such as notification to the registrant of a potential problem. Similarly, if an e-mail bounce-back to a dead address is received 180, then it is marked accurate 170. Since a server may be down or an e-mail may bounce-back for other reasons, addresses may be reconfirmed at a later date to give such computer problems time to clear.
A periodic e-mail is sent to every preferred address on a routine basis. The process is best illustrated in FIG. 5. It is also within the scope of this invention to send e-mails to all addresses provided by a registrant. However, maintaining the integrity of the system to a large extent relies on keeping the preferred address accurate.
Similar to the confirmation e-mail process described above, once a period of time has passed without a bounce-back message 205, the message is determined to have been successfully received and the preferred e-mail address marked “accurate” in the database 210. In the event that a bounce-back is received, the process is shifted to provide for sending e-mails to other current e-mail addresses of the registrant 212.
If one or more current e-mail addresses exist, then the system sends a request to the registrant at the first current address requesting that the registrant update his preferred address 215. If the registrant returns and updates his preferred address 220, the testing process will begin again at step 200. If, within a designated period of time, that message is bounced-back, that address is marked suspect, and the system sends an e-mail to the next listed current address, if any, in step 212. Step 212 is also repeated if the registrant fails to return to the site to update his preferred address within a reasonable period of time.
Once all current addresses have been used with no updating of the preferred address, the system searches for registered contact addresses 225. An e-mail to the contacts' e-mail addresses requests the e-mail address of the registrant 230. If a contact provides an e-mail address for the registrant 235, it is added to the database record 240 and step 215 is re-executed. If, within a designated period of time, no contacts provide an updated address. the registrant's information is marked “suspect 245”.
While it is not part of the system, the registrant or visitor may use the system in conjunction with an address book that is retained either on a common website or a local address book that can be purchased or created at other websites, an individual computer, or a network of computers. For example, the system may be used in conjunction with commercial e-mail systems such as those offered by Microsoft (Outlook) or web-based e-mail systems such as Hotmail. As such, when the registrant sends an e-mail, the system will be searched and the e-mail address for the recipient (if a registrant) will be confirmed or updated before the e-mail is sent.
Similarly, as shown in FIG. 6, target e-mail lists or e-mail address books may be forwarded 275 to the system for review of each of the target e-mail addresses 280. The review is similar to that undertaken during the search process noted above. However, with larger databases that are being reviewed, the system will either correct the actual information in the delivered database or provide a table of the delivered addresses and the preferred address for those in the system 285. An alternative is to have a series of bounce-backs sent to the system 290. The system culls the bounce-backs 295 for each address used in the failed e-mail. These e-mail addresses become the targets for the searching process described above.
Additionally, a connection to the system may be provided in standard bounce-back e-mail messages so that the recipient of such a message can use the system to search for a preferred address. In a preferred embodiment, a link will be provided in the bounce-back message to a web site on the Internet where the recipient can use the system.
Having described this invention in detail, those skilled in the art will appreciate that numerous modifications may be made thereof without departing form the spirit of this invention. Therefore, it is not intended that the scope of this invention be limited to the embodiment illustrated and described. Rather, it is intended that the scope of this invention be determined by the appended claims and their equivalents.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5999932 *||Jan 13, 1998||Dec 7, 1999||Bright Light Technologies, Inc.||System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing|
|US6061738 *||Oct 28, 1997||May 9, 2000||D&I Systems, Inc.||Method and system for accessing information on a network using message aliasing functions having shadow callback functions|
|US6457060 *||Apr 30, 1998||Sep 24, 2002||Openwave Systems Inc.||Method and apparatus for flexibly linking to remotely located content on a network server through use of aliases|
|US6505236 *||Apr 30, 1999||Jan 7, 2003||Thinmail, Inc.||Network-based mail attachment storage system and method|
|US6507866 *||Jul 19, 1999||Jan 14, 2003||At&T Wireless Services, Inc.||E-mail usage pattern detection|
|US6574658 *||Jan 29, 1999||Jun 3, 2003||Lucent Technologies Inc.||System and method for secure classification of electronic mail|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US6829636 *||Sep 28, 2000||Dec 7, 2004||International Business Machines Corporation||Method and apparatus for controlling dead e-mail address scanning discovery, status retries, and other metrics to enforce e-mail quality of service|
|US6892222||May 31, 2002||May 10, 2005||Return Path, Inc.||System and method for re-routing of e-mail messages|
|US6898623 *||Jun 16, 2000||May 24, 2005||Hewlett-Packard Development Company L.P.||Simplified configuration of an internet-enabled device|
|US6959324||Sep 28, 2000||Oct 25, 2005||International Business Machines Corporation||Method and apparatus for adding data attributes to e-mail messages to enhance the analysis of delivery failures|
|US7080122 *||Aug 3, 2001||Jul 18, 2006||Return Path, Inc.||System and process for updating electronic messaging accounts|
|US7130918 *||Apr 5, 2001||Oct 31, 2006||Microsoft Corporation||Mobile internet voice service|
|US7149780||Dec 14, 2001||Dec 12, 2006||Pitney Bowes Inc.||Method for determining e-mail address format rules|
|US7191222||Jan 13, 2006||Mar 13, 2007||Pitney Bowes Inc.||Method for providing address change notification in an electronic message forwarding system|
|US7206816 *||Jan 29, 2004||Apr 17, 2007||Teamon Systems, Inc.||System and method of polling electronic mailboxes|
|US7254573||Oct 2, 2003||Aug 7, 2007||Burke Thomas R||System and method for identifying alternate contact information in a database related to entity, query by identifying contact information of a different type than was in query which is related to the same entity|
|US7265858 *||Oct 3, 2001||Sep 4, 2007||Kabushiki Kaisha Toshiba||Method and system to access address books|
|US7305443 *||Jun 27, 2002||Dec 4, 2007||International Business Machines Corporation||System and method for tailoring of electronic messages|
|US7320019 *||Nov 30, 2000||Jan 15, 2008||At&T Delaware Intellectual Property, Inc.||Method and apparatus for automatically checking e-mail addresses in outgoing e-mail communications|
|US7389324||Nov 7, 2003||Jun 17, 2008||Plaxo, Inc.||Viral engine for network deployment|
|US7440439||Dec 27, 2001||Oct 21, 2008||Microsoft Corporation||Method of inquiring|
|US7478132 *||Jan 24, 2005||Jan 13, 2009||International Business Machines Corporation||Dynamic email content update process|
|US7543016 *||Jul 31, 2003||Jun 2, 2009||International Business Machines Corporation||Method, system and program product for automatically assigning electronic addresses to users|
|US7543026||Dec 14, 2001||Jun 2, 2009||Quine Douglas B||System and method for address correction of electronic messages|
|US7580983||Mar 17, 2006||Aug 25, 2009||Douglas B Quine||E-mail forwarding system having archival database|
|US7596600||Aug 15, 2002||Sep 29, 2009||Quine Douglas B||System for selective delivery of electronic communications|
|US7620387 *||Nov 25, 2005||Nov 17, 2009||Research In Motion Limited||Entering contacts in a communication message on a mobile device|
|US7747692||Jun 20, 2007||Jun 29, 2010||International Business Machines Corporation||System and method for tailoring of electronic messages|
|US7774368||Jun 30, 2006||Aug 10, 2010||Plaxo, Inc.||Contact management update protocols|
|US7788331 *||Feb 23, 2007||Aug 31, 2010||Teamon Systems, Inc.||System and method of polling electronic mailboxes|
|US7831241||Oct 7, 2009||Nov 9, 2010||Research In Motion Limited||Entering contacts in a communication message on a mobile device|
|US7975010 *||Mar 23, 2005||Jul 5, 2011||Symantec Corporation||Countering spam through address comparison|
|US7996357||Feb 29, 2008||Aug 9, 2011||Plaxo, Inc.||Enabling synchronization with a difference unaware data source|
|US8032559||Jun 29, 2010||Oct 4, 2011||Plaxo, Inc.||Contact management update protocols|
|US8161419||Jun 18, 2008||Apr 17, 2012||Smooth Productions Inc.||Integrated graphical user interface and system with focusing|
|US8239463||Jan 15, 2008||Aug 7, 2012||At&T Intellectual Property I, L.P.||Method and apparatus for automatically checking E-mail addresses in outgoing E-mail communications|
|US8271535||Sep 29, 2011||Sep 18, 2012||Plaxo, Inc.||Contact management update protocols|
|US8341184||May 7, 2009||Dec 25, 2012||Smooth Productions Inc.||Communications network system and service provider|
|US8370940||Nov 4, 2010||Feb 5, 2013||Cloudflare, Inc.||Methods and apparatuses for providing internet-based proxy services|
|US8510123||Dec 17, 2008||Aug 13, 2013||Smooth Productions Inc.||Communications system and method for serving electronic content|
|US8510137||Dec 17, 2008||Aug 13, 2013||Smooth Productions Inc.||Communications system and method for serving electronic content|
|US8572737||Sep 30, 2011||Oct 29, 2013||Cloudflare, Inc.||Methods and apparatuses for providing internet-based proxy services|
|US8601064 *||Apr 28, 2006||Dec 3, 2013||Trend Micro Incorporated||Techniques for defending an email system against malicious sources|
|US8620860||Jul 1, 2011||Dec 31, 2013||Plaxo, Inc.||Enabling synchronization with a difference unaware data source|
|US8675845||Nov 2, 2010||Mar 18, 2014||Blackberry Limited||Entering contacts in a communication message on a mobile device|
|US8751633||Nov 4, 2010||Jun 10, 2014||Cloudflare, Inc.||Recording internet visitor threat information through an internet-based proxy service|
|US8788535||Dec 24, 2012||Jul 22, 2014||Smooth Productions Inc.||Communication network system and service provider|
|US8788596 *||Dec 30, 2008||Jul 22, 2014||Engate Technology Corporation||Unsolicited message rejecting communications processor|
|US8850580||Apr 1, 2011||Sep 30, 2014||Cloudflare, Inc.||Validating visitor internet-based security threats|
|US8892660||Dec 12, 2008||Nov 18, 2014||International Business Machines Corporation||Dynamic email content update process|
|US8965787||Jun 18, 2008||Feb 24, 2015||Smooth Productions Inc.||Communications system and method for serving electronic content|
|US9009330||Nov 4, 2010||Apr 14, 2015||Cloudflare, Inc.||Internet-based proxy service to limit internet visitor connection speed|
|US9049247||Nov 4, 2010||Jun 2, 2015||Cloudfare, Inc.||Internet-based proxy service for responding to server offline errors|
|US20010014085 *||Jan 26, 2001||Aug 16, 2001||Microsoft Corporation||Originator authentication|
|US20010015977 *||Jan 26, 2001||Aug 23, 2001||Stefan Johansson||Selective reception|
|US20020007397 *||Apr 5, 2001||Jan 17, 2002||Microsoft Corporation||Mobile internet voice service|
|US20020065891 *||Nov 30, 2000||May 30, 2002||Malik Dale W.||Method and apparatus for automatically checking e-mail addresses in outgoing e-mail communications|
|US20040133561 *||Oct 2, 2003||Jul 8, 2004||Burke Thomas R.||System and method for identifying alternate contact information|
|US20050027883 *||Jul 31, 2003||Feb 3, 2005||International Business Machines Corporation||Method, system and program product for automatically assigning electronic addresses to users|
|US20050171996 *||Jan 29, 2004||Aug 4, 2005||Teamon Systems, Inc.||System and method of polling electronic mailboxes|
|US20060010214 *||Mar 4, 2005||Jan 12, 2006||Return Path||System and method for re-routing of e-mail messages|
|US20060080284 *||Nov 7, 2003||Apr 13, 2006||Masonis John T||Viral engine for network deployment|
|US20060135135 *||Nov 25, 2005||Jun 22, 2006||Research In Motion Limited||Entering contacts in a communication message on a mobile device|
|US20060161633 *||Mar 17, 2006||Jul 20, 2006||Pitney Bowes Inc.||E-mail forwarding system having archival database|
|US20060168346 *||Jan 24, 2005||Jul 27, 2006||International Business Machines Corporation||Dynamic Email Content Update Process|
|US20060242210 *||Jun 30, 2006||Oct 26, 2006||Plaxo, Inc.||Contact management update protocols|
|US20120116896 *||May 10, 2012||Lee Hahn Holloway||Internet-based proxy service to modify internet responses|
|US20130046838 *||Aug 31, 2010||Feb 21, 2013||Nederlandse Organisatie voor toegepast natuuwetenschappelijik onderzoek TNO||Support for network routing selection|
|USRE43118||Dec 11, 2008||Jan 17, 2012||Turnpike Data Processing Llc||Method for determining e-mail address format rules|
|USRE45351||May 14, 2013||Jan 20, 2015||Tena Technology, Llc||Method and apparatus for selectively sharing and passively tracking communication device experiences|
|USRE45543||May 14, 2013||Jun 2, 2015||Tena Technology, Llc||Method and apparatus for selectively sharing and passively tracking communication device experiences|
|U.S. Classification||709/206, 709/219, 709/203, 709/245|
|International Classification||G06Q10/00, H04L12/58|
|Cooperative Classification||H04L51/28, H04L51/30, G06Q10/107|
|European Classification||G06Q10/107, H04L12/58|
|Jun 20, 2002||AS||Assignment|
Owner name: FRESHADDRESS, INC., MASSACHUSETTS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BLISS, AUSTIN C.;MACK, ROBERT W.;KAPLAN, WILLIAM B.;AND OTHERS;REEL/FRAME:013013/0016;SIGNING DATES FROM 20020604 TO 20020610
|May 25, 2007||FPAY||Fee payment|
Year of fee payment: 4
|May 25, 2011||FPAY||Fee payment|
Year of fee payment: 8
|May 25, 2015||FPAY||Fee payment|
Year of fee payment: 12